Çѱ¹Á¤º¸Åë½ÅÇÐȸ ³í¹®Áö (Journal of the Korea Institute of Information and Communication Engineering)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¿¡³ÊÁö ÇϺ£½ºÆà ³×Æ®¿öÅ©¿¡¼ ÃÖ¼Ò ¿ä±¸ º¸¾È ¿ë·®À» ÃÖ´ëÈÇϱâ À§ÇÑ ½Ã°£ Àüȯ ±â¹ÝÀÇ ¾Æ³¯·Î±× ³×Æ®¿öÅ© ÄÚµù |
¿µ¹®Á¦¸ñ(English Title) |
Time Switching-based Analog Network Coding for Maximizing the Minimum Required Secrecy Capacity in Energy Harvesting Networks |
ÀúÀÚ(Author) |
À̱â¼Û
ÃÖÇöÈ£
Kisong Lee
Hyun-Ho Choi
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 21 NO. 11 PP. 2022 ~ 2028 (2017. 11) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù »ç¹° ÀÎÅÍ³Ý ±â¼úÀÇ ¹ß´Þ·Î ÀÎÇØ »ç¿ëµÇ´Â ¼¾¼ÀÇ ¼ö°¡ ´Ã¾î³²¿¡ µû¶ó ¼¾¼ÀÇ Àü¿ø ºÎÁ· ¹× »çÀûÀÎ Á¤º¸ÀÇ À¯ÃâÀÌ ½É°¢ÇÑ ¹®Á¦·Î ¿©°ÜÁö°í ÀÖ´Ù. ÀÌ·¯ÇÑ ¹®Á¦µéÀ» ÇØ°áÇϱâ À§ÇØ ¿ÜºÎÀÇ RF ½ÅÈ£·ÎºÎÅÍ Àü·ÂÀ» ¼öÁýÇÏ´Â RF ¿¡³ÊÁö ÇϺ£½ºÆðú ¹°¸®°èÃþ º¸¾È ±â¼úÀÇ Á߿伺ÀÌ Á¡Â÷ Ä¿Áö°í ÀÖ´Ù. º» ³í¹®¿¡¼´Â ¼Ò½º°¡ Àü¼ÛÇÏ´Â ½ÅÈ£·ÎºÎÅÍ ¿¡³ÊÁö ÇϺ£½ºÆÃÀÌ °¡´ÉÇÑ ¸±·¹ÀÌ°¡ Á¸ÀçÇÏ´Â ¹«¼± ³×Æ®¿öÅ©¿¡¼ Á¤º¸ º¸¾ÈÀ» Çâ»ó½ÃÅ°±â À§ÇÑ ½Ã°£ Àüȯ ±â¹Ý ³×Æ®¿öÅ© ¾Æ³¯·Î±× ÄÚµù ±â¹ýÀ» Á¦¾ÈÇÑ´Ù. ¼Ò½º°¡ Àü¼ÛÇÏ´Â ½ÅÈ£¸¦ µµÃ»ÇÏ·Á´Â µµÃ»ÀÚ°¡ Á¸ÀçÇÏ´Â 2-hop ¸±·¹ÀÌ ³×Æ®¿öÅ©¸¦ ¸ðµ¨¸µÇÏ°í, ¼öÇÐÀû ºÐ¼®À» ÅëÇØ ÃÖ¼Ò ¿ä±¸ º¸¾È ¿ë·®À» ÃÖ´ëÈ ÇÒ ¼ö ÀÖ´Â ÃÖÀûÀÇ ½Ã°£ Àüȯ ºñÀ²À» ã¾Ò´Ù. ´Ù¾çÇÑ È¯°æ¿¡¼ ½Ã¹Ä·¹À̼ÇÀ» ÅëÇØ Á¦¾È ¹æ¾ÈÀÌ ±âÁ¸ ¹æ¾È¿¡ ºñÇØ ÃÖ¼Ò ¿ä±¸ º¸¾È ¿ë·®À» °³¼±ÇÔÀ» º¸ÀδÙ.
|
¿µ¹®³»¿ë (English Abstract) |
Recently, the energy shortage of sensors and the leakage of private information are considered as serious problems as the number of sensors is increasing due to the technological advance in Internet-of-Things. RF energy harvesting, in which sensors collect energy from external RF signals, and physical layer security become increasingly important to solve these problems. In this paper, we propose a time switching-based network analog coding for improving information security in wireless networks where the relay can harvest energy from source signals. We formulate 2-hop relay networks where an eavesdropper tries to overhear source signals, and find an optimal time switching ratio for maximizing the minimum required secrecy capacity using mathematical analysis. Through simulations under various environments, it is shown that the proposed scheme improves the minimum required secrecy capacity significantly, compared to the conventional scheme.
|
Å°¿öµå(Keyword) |
¿¡³ÊÁö ÇϺ£½ºÆÃ
½Ã°£ Àüȯ
º¸¾È ¿ë·®
¹°¸®°èÃþ º¸¾È
¾Æ³¯·Î±× ³×Æ®¿öÅ© ÄÚµù
Energy Harvesting
Time Switching
Secrecy Capacity
Physical Layer Security
Analog Network Coding
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|